logo

Statutory And Legal Consideration Report

   

Added on  2022-08-17

13 Pages2609 Words17 Views
Data Science and Big Data
 | 
 | 
 | 
Running head: PEN TESTING
PEN TESTING
Name of the Student
Name of the University
Author note
Statutory And Legal Consideration Report_1

1
PEN TESTING
Table of Contents
Different penetration model.............................................................................................................2
Statutory and Legal consideration of the pen testers.......................................................................4
SOP for task 2..................................................................................................................................6
Decision Tree...................................................................................................................................9
References......................................................................................................................................10
Statutory And Legal Consideration Report_2

2
PEN TESTING
Different penetration model
Penetration testing is considered to be an ethical hacking process that is often used by
different business organizations for checking of the security process of their network and
applications. Pen testing can be performed in 3 different manners. They are namely Black box
testing, grey box testing and white box testing. All the 3 testing methods have been in use in
today's society and have been effectual in the penetration process. The entire process is
performed with the help of data gathering and hence wise this ensures that there has been a
proper assessment of the weaknesses in the server (Mehta, Raj and Singh 2018). With the help of
pen testing, the security policies of the organizations are tested. Ability to identify the processing
of the awareness of the security assessors is included in the process.
The three methods that are being discussed in the process are as follows: -
White box method
Grey Box Method
Black box method
Despite the fact that the prime objective of these methods is similar, the working process of these
methods has been different.
Comparison between different pen testing models
The difference between these methods are as follows: -
White box method Grey Box Method Black box method
Statutory And Legal Consideration Report_3

3
PEN TESTING
Knowledge
requirement
It have been seen that in
case of the white box
testing, the knowledge of
the internal working
structure is to be known
by the pen tester. This is
considered to be one of
the most efficient process
of performing the test.
Coding of the software is
also known by the pen
tester in the process. It
have been seen that
proper knowledge of the
testing process is well
known in the processing
of the testing (Stefinko,
Piskozub and Banakh
2016).
Whereas, in case of the
grey box testing, partial
section of the internal
working process is
known to the pen tester
Again in case of black
box testing, the main
aspect that is
considered in the
process is that there is
no access to the internal
framework of the
testing process. This
pen tester does not
require any kind of
knowledge regarding
the codes that have
been performing the
internal framework (de
Jiménez 2016). The
main aspect that is
required in the process
is the Graphical User
Interface.
White box testing is
known as clear box
testing and hence wise is
considered to be
Again in the case of the
grey box testing, the
pen tester has limited
knowledge regarding
The black box testing is
considered to be a data-
driven testing process.
It has been seen that the
Statutory And Legal Consideration Report_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
What is Penetratiton Testing | Assignment
|13
|2640
|12

Top 5 Penetration Testing Methodologies and Standards
|11
|2477
|29

Pen Test Methodology Comparisons
|11
|2755
|43

Computer Science and Security | Task Report
|43
|3989
|16

Penetration Testing Report And Management
|12
|2862
|10

What is Penetration Testing and How Does It Work? -
|12
|2793
|15